• Title/Summary/Keyword: backup system

Search Result 316, Processing Time 0.027 seconds

Implementation of Access Control System Suitable for Meteorological Tasks in Grid Computing Environment (그리드 컴퓨팅 환경에서 기상업무에 적합한 접근 제어 시스템 구현)

  • Na, Seung-kwon;Ju, Jae-han
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.2
    • /
    • pp.206-211
    • /
    • 2017
  • Recently computing devices by connecting to a network, grid computing, the next generation of digital neural networks that provide maximum service will connect all of the computer such as a PC or server, PDA into one giant network makes the virtual machine. Therefore, we propose the grid computing implementation model to be applied to meteorological business field as follows. First, grid computing will be used for tasks such as the development of numerical models below the mid-scale or test operations, and the final backup of the weather supercomputer. Second, the resources that will constitute grid computing are limited to business PCs and Linux servers operated by the central government considering operational efficiency. Third, the network is restricted to the LAN section, which suggests the implementation of high performance computing.

A Proactive Approach to Reconstructing Overlay Multicast Trees using Resource Reservation (자원 예약 방식을 사용한 오버레이 멀티캐스트 트리의 구성과 복구 방안)

  • Heo, Kwon;Son, Suung-Chul;Kim, Kyung-Hoon;Song, Ho-Young;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1049-1057
    • /
    • 2006
  • Overlay Multicast is an effective method for efficient utilization of system resources and network bandwidth without using hardware customization. Unlike in IP multicast, multicast tree reconstruction is required when non-leaf node leaves or fails. In this paper, we propose a proactive approach to solve this defect by using a resource reservation of the out degrees. This allows children of non-leaf node to connect to its new parent node immediately when its parent node leaves or fails. In our proposal, a proactive route maintenance gives a fast recovery time and reduces a delay effect in the new route. The simulation results show that our proposal takes shorter period of time than the other algorithms to reconstruct a similar tree and that it is a more effective way to deal with a lot of nodes that have lost their parent nodes.

A video transmission system for a high quality and fault tolerance based on multiple paths using TCP/IP (다중 경로를 이용한 TCP/IP 기반 고품질 및 고장 감내 비디오 전송 시스템)

  • Kim, Nam-Su;Lee, Jong-Yeol;Pyun, Kihyun
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.1-8
    • /
    • 2014
  • As the e-learning spreads widely and demands on the internet video service, transmitting video data for many users over the Internet becomes popular. To satisfy this needs, the traditional approach uses a tree structure that uses the video server as the root node. However, this approach has the danger of stopping the video service even when one of the nodes along the path has a some problem. In this paper, we propose a video-on-demand service that uses multiple paths. We add new paths for backup and speed up for transmitting the video data. We show by simulation experiments that our approach provides a high-quality of video service.

Partially Decentralized Passive Replication Algorithm (부분적 분산형 수동적 중복 알고리즘)

  • Ahn, Jin-Ho
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.507-514
    • /
    • 2005
  • This paper presents a partially decentralized passive replication algorithm for deterministic servers in message-passing distributed systems. The algorithm allows any backup server, not necessarily the primary server, to take responsibility for processing its received client request and coordinating with the other replica servers after obtaining the delivery sequence number of the request from the primary. Thanks to thus desirable feature, the algorithm with conventional load balancing techniques can efficiently avoid extreme load conditions on the primary. Therefore, it can provide better scalability of deterministic and replicated sewer systems than traditional passive replication algorithms. Simulation results indicate that the proposed algorithm can reduce $16.5\%{\~}52.3\%$ of the average response time of a client request compared with the traditional ones.

Delay Compensation Mechanism for a Link Failure in Control Networks of Railway Vehicles (철도 차량을 위한 제어용 통신망에서 링크 장애 시 딜레이 보상 기법)

  • Hwang, Hwanwoong;Kim, Sanghyun;Yun, Ji-Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.10-16
    • /
    • 2016
  • For higher reliability against a link failure of a control network in railway vehicles, a recovery mechanism is needed. We introduce a problem that, when a link failure occurs in a ring-topology control network, a node may experience a significant increase of transmission delay depending on its relative position within the network. We then propose two mechanisms to solve this problem: (1) differentiating and prioritizing node traffic in forwarding; and (2) switching some nodes to a backup bus-topology network. Our simulation study shows that, while the first mechanism achieves a limited gain by only compensating queuing delay, the second one gets a sufficient gain which is impacted by the number of nodes switched to the bus network.

Data Availability Zone for backup system in Cloud computing service (클라우드 컴퓨팅 서비스 백업을 위한 데이터 가용영역 방법론)

  • Park, Young-ho;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.366-369
    • /
    • 2014
  • Recently been viewed as a core technology of the IT industry, cloud computing services. It is expected that the market for cloud services industry showed a growth rate of 18.9% annually, to form a scale of $ 1,330 billion dollars in 2013, and to form a 1,768 billion dollars in 2015. Growth of cloud computing services industry, provides the operational efficiency and reduce costs for many companies, but the risks associated with it is also increasing. There is a problem that phenomenon is to lose control of the data on features of the cloud service, more data is gathered in one place, when a failure occurs, it is removed simultaneously the data of all devices. therefore, in the present paper is investigate the area a quick recovery with up to the problem and secure data storage INT the cloud computing service is available in only the data in the cloud service possible.

  • PDF

User-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage (블록체인과 분산 스토리지를 활용한 프록시 재암호화 기반의 사용자 중심 재해 복구 시스템)

  • Park, Junhoo;Kim, Geunyoung;Kim, Junseok;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1157-1169
    • /
    • 2021
  • The disaster recovery refers to policies and procedures to ensure continuity of services and minimize loss of resources and finances in case of emergency situations such as natural disasters. In particular, the disaster recovery method by the cloud service provider has advantages such as management flexibility, high availability, and cost effectiveness. However, this method has a dependency on a service provider and has a structural limitation in which a user cannot be involved in personal data. In this paper, we propose a protocol using proxy re-encryption for data confidentiality by removing dependency on service providers by backing up user data using blockchain and distributed storage. The proposed method is implemented in Ethereum and IPFS environments, and presents the performance and cost required for backup and recovery operations.

Comparison of Predicted and Measured ASF (ASF 예측치와 실측치 비교)

  • Shin, Mi-Young;Hwang, Sang-Wook;Yu, Dong-Hui;Park, Chan-Sik;Lee, Chang-Bok;Lee, Sang-Jeong
    • Journal of Navigation and Port Research
    • /
    • v.34 no.3
    • /
    • pp.175-180
    • /
    • 2010
  • In the almost application parts, GNSS being used the primary navigation system on world-widely. However, some of nations attempt or deliberate to enhance current Loran system, as a backup to satellite navigation system because of the vulnerability to the disturbance signal. Loran interests in supplemental navigation system by the development and enhancement, which is called eLoran, and that consists of advancement of receiver and transmitter and of differential Loran in order to increase the accuracy of current Loran-C. A significant factor limiting the ranging accuracy of the eLoran signal is the ASF in the TOAs observed by the receiver. The ASF is mostly due to the fact that the ground-wave signal is likely to propagate over paths of varying conductivity and topography. This paper presents comparison results between the predicted ASF and the measured ASF in a southern east region of Korea. For predicting ASF, the Monteath model is used. Actual ASF is measured from the legacy Loran signal transmitted Pohang station in the GRI 9930 chain. The test results showed the repeatability of the measured ASF and the consistent characteristics between the predicted and the measured ASF values.

Analysis of Propagation Environment for Selecting R-Mode Reference and Integrity Station (R-Mode 보정국과 감시국 선정을 위한 전파환경 분석에 관한 연구)

  • Jeon, Joong-Sung;Jeong, Hae-Sang;Gug, Seung-Gi
    • Journal of Navigation and Port Research
    • /
    • v.45 no.1
    • /
    • pp.26-32
    • /
    • 2021
  • In ocean field, the spread of the Fourth Industrial Revolution based on information and communication technology requires high precision and stable PNT&D (Position, Navigation, Timing and Data). As the IMO (International Maritime Organization) and IALA (The International Association of Marine Aids to Navigation and Lighthouse Authorities) are requiring backup systems due to mitigate vulnerabilities and the increase of dependency on GNSS (Global Navigation Satellite System), Korea is conducting a research & development of R-Mode. An DGPS (Differentiate Global Positioning System) reference station that uses MF, an existing maritime infrastructure, and AIS (Automatic Identification System) base stations that use 34 integrity station and VHF will be utilized in this study to avoid redundant investment. Because there are radio shadow areas that display low signal levels in the west sea, the establishment of new R-Mode reference and integrity station will be intended to resolve problems regrading the radio shadow area. Because the frequency has a characteristic in that radio wave transmits well along the ground (water surface) in low frequency band, simulation and measurement were conducted therefore this paper to propose candidate sites for R-Mode reference and integrity station resulted through p wave's propagation characteristics analysis. Using this paper, R-Mode reference and integrity station can be established at appropriate locations to resolve radio shadow areas in other regions.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.